Compare commits
4 Commits
feat/helm-
...
feature/mo
Author | SHA1 | Date | |
---|---|---|---|
a74507cafb | |||
4c2f9bc035 | |||
63a08f2264 | |||
9dedfc1690 |
6
molgenis-jenkins/resources/README.md
Normal file
6
molgenis-jenkins/resources/README.md
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
To be able to run helm inside a jenkins pod, you'll need to
|
||||||
|
* create a role in the namespace where tiller is installed
|
||||||
|
* bind that role to the user that jenkins pods run as
|
||||||
|
|
||||||
|
This directory contains yaml for these resources.
|
||||||
|
See also https://github.com/helm/helm/blob/master/docs/rbac.md
|
@ -0,0 +1,13 @@
|
|||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
name: tiller-jenkins-binding
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: tiller-user
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: default
|
||||||
|
namespace: molgenis-jenkins
|
18
molgenis-jenkins/resources/tiller-user-role.yaml
Normal file
18
molgenis-jenkins/resources/tiller-user-role.yaml
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
name: tiller-user
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- pods/portforward
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- pods
|
||||||
|
verbs:
|
||||||
|
- list
|
@ -453,6 +453,69 @@ jenkins:
|
|||||||
secretName: molgenis-pipeline-vault-secret
|
secretName: molgenis-pipeline-vault-secret
|
||||||
secretKey: addr
|
secretKey: addr
|
||||||
NodeSelector: {}
|
NodeSelector: {}
|
||||||
|
molgenis-it:
|
||||||
|
InheritFrom: molgenis
|
||||||
|
Label: molgenis-it
|
||||||
|
NodeUsageMode: EXCLUSIVE
|
||||||
|
Containers:
|
||||||
|
elasticsearch:
|
||||||
|
Image: docker.elastic.co/elasticsearch/elasticsearch
|
||||||
|
ImageTag: 5.5.3
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: "100m"
|
||||||
|
memory: "1Gi"
|
||||||
|
limits:
|
||||||
|
cpu: "1"
|
||||||
|
memory: "1500Mi"
|
||||||
|
EnvVars:
|
||||||
|
- type: KeyValue
|
||||||
|
key: ES_JAVA_OPTS
|
||||||
|
value: "-Xms512m -Xmx512m"
|
||||||
|
- type: KeyValue
|
||||||
|
key: cluster.name
|
||||||
|
value: molgenis
|
||||||
|
- type: KeyValue
|
||||||
|
key: bootstrap.memory_lock
|
||||||
|
value: "true"
|
||||||
|
- type: KeyValue
|
||||||
|
key: xpack.security.enabled
|
||||||
|
value: "false"
|
||||||
|
- type: KeyValue
|
||||||
|
key: discovery.type
|
||||||
|
value: single-node
|
||||||
|
postgres:
|
||||||
|
Image: postgres
|
||||||
|
ImageTag: 9.6-alpine
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: "100m"
|
||||||
|
memory: "250Mi"
|
||||||
|
limits:
|
||||||
|
cpu: "1"
|
||||||
|
memory: "250Mi"
|
||||||
|
EnvVars:
|
||||||
|
- type: KeyValue
|
||||||
|
key: POSTGRES_USER
|
||||||
|
value: molgenis
|
||||||
|
- type: KeyValue
|
||||||
|
key: POSTGRES_PASSWORD
|
||||||
|
value: molgenis
|
||||||
|
- type: KeyValue
|
||||||
|
key: POSTGRES_DB
|
||||||
|
value: molgenis
|
||||||
|
opencpu:
|
||||||
|
Image: molgenis/opencpu
|
||||||
|
AlwaysPullImage: true
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: "100m"
|
||||||
|
memory: "256Mi"
|
||||||
|
limits:
|
||||||
|
cpu: "1"
|
||||||
|
memory: "512Mi"
|
||||||
|
NodeSelector: {}
|
||||||
|
|
||||||
#secret contains configuration for the kubernetes secrets that jenkins can access
|
#secret contains configuration for the kubernetes secrets that jenkins can access
|
||||||
secret:
|
secret:
|
||||||
# vault configures the vault secret
|
# vault configures the vault secret
|
||||||
|
Reference in New Issue
Block a user